Website β’ LinkedIn β’ π§ john.edward.burns.jr@gmail.com
Iβm a security-focused IT systems engineer with 10+ years of experience in infrastructure, automation, and cybersecurity operations.
My work bridges hands-on engineering and clear communication β I design, secure, and document systems that scale.
Currently focused on:
- π§± Infrastructure as Code (IaC) with Terraform & Azure ARM templates
- βοΈ Cloud Security Architecture (AWS + Azure)
- π Identity & Access Management (IAM) and Zero Trust alignment
- π§© Security Automation with PowerShell, Python & SIEM integrations
- π Compliance Mapping to NIST 800-53 and CIS Benchmarks
- π§ Incident Response & Detection Engineering (Splunk, Wazuh, MITRE ATT&CK)
A minimal, compliant AWS workload designed for security from the start.
Highlights
- Infrastructure as Code deployment using Terraform
- Hardened AWS EC2 with least-privilege IAM roles
- CloudWatch & GuardDuty integration
- Documentation mapped to NIST 800-53 (AC, AU, SI, SC families)
π System Security Requirements Document
π View Terraform Code
Simplifying and securing identity lifecycles across Azure AD (Entra ID) and Okta.
Includes
- PowerShell scripts for group lifecycle and MFA enforcement
- Automated access reviews & compliance reports
- RBAC mapping and zero-trust documentation
π IAM Policy Documentation Samples
π§© PowerShell Automation Scripts
Home SOC-style project focusing on real-time visibility and automated response.
Stack Splunk β’ Wazuh β’ Windows Server β’ Ubuntu β’ MITRE ATT&CK
What I Built
- Automated log ingestion with PowerShell β Splunk
- Detection logic for failed logins & PowerShell abuse
- Auto-response script: disable user after failed login attempts
- Visualization dashboards for alert monitoring
π Detection Rule Logic (Splunk)
ποΈ Incident Response Playbooks (Markdown)
Streamlining vulnerability detection, patching, and documentation.
Tools PowerShell β’ Nessus β’ OpenVAS β’ Excel Automation
Features
- PowerShell patch automation
- Vulnerability scan mapping to NIST controls
- Continuous monitoring dashboards
- Change logs & remediation documentation
π Remediation Report Template
ποΈ Change Logs with Compliance Notes
A hybrid SOC environment integrating Splunk, Wazuh, and cloud telemetry.
Core Capabilities
- End-to-end visibility (Windows + Linux endpoints)
- Automated alerts and ticket creation
- MITRE ATT&CK-based detection testing
- Scripted backup and restore functions
π§© Lab Diagram & Setup Guide
π Automation Scripts & Configs
Recent Topics
- How to Build a Home SOC for Under $20
- The Hidden Value of Documentation in Security Engineering
- What My 90-Day Lab Sprint Taught Me About Detection Engineering
π Read more at johnedwardburns.com
- CI/CD security scans via GitHub Actions
- Terraform + AWS Config continuous compliance checks
- Automated IaC compliance checker (Python)
- Blue-Team playbook library (Markdown format)
Helping non-technical teams and parents understand the basics of cybersecurity.
Follow my journey at johnedwardburns.com
- π« Email: john.edward.burns.jr@gmail.com
- π§Ύ LinkedIn: linkedin.com/in/johneburnsjr
β
Deploy a containerized app in AWS using Terraform + Kubernetes
β
Write and publish an SSP example with mapped controls
β
Create CI/CD security guidance for small organizations